1 /*
2 * Copyright (c) 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 *
21 * sf-pcap.c - libpcap-file-format-specific code from savefile.c
22 * Extraction/creation by Jeffrey Mogul, DECWRL
23 * Modified by Steve McCanne, LBL.
24 *
25 * Used to save the received packet headers, after filtering, to
26 * a file, and then read them later.
27 * The first record in the file contains saved values for the machine
28 * dependent values so we can print the dump file on any architecture.
29 */
30
31 #ifdef HAVE_CONFIG_H
32 #include <config.h>
33 #endif
34
35 #include <pcap-types.h>
36 #ifdef _WIN32
37 #include <io.h>
38 #include <fcntl.h>
39 #endif /* _WIN32 */
40
41 #include <errno.h>
42 #include <memory.h>
43 #include <stdio.h>
44 #include <stdlib.h>
45 #include <string.h>
46 #include <limits.h> /* for INT_MAX */
47
48 #include "pcap-int.h"
49 #include "pcap-util.h"
50
51 #include "pcap-common.h"
52
53 #ifdef HAVE_OS_PROTO_H
54 #include "os-proto.h"
55 #endif
56
57 #include "sf-pcap.h"
58
59 /*
60 * Setting O_BINARY on DOS/Windows is a bit tricky
61 */
62 #if defined(_WIN32)
63 #define SET_BINMODE(f) _setmode(_fileno(f), _O_BINARY)
64 #elif defined(MSDOS)
65 #if defined(__HIGHC__)
66 #define SET_BINMODE(f) setmode(f, O_BINARY)
67 #else
68 #define SET_BINMODE(f) setmode(fileno(f), O_BINARY)
69 #endif
70 #endif
71
72 /*
73 * Standard libpcap format.
74 *
75 * The same value is used in the rpcap protocol as an indication of
76 * the server byte order, to let the client know whether it needs to
77 * byte-swap some host-byte-order metadata.
78 */
79 #define TCPDUMP_MAGIC 0xa1b2c3d4
80
81 /*
82 * Alexey Kuznetzov's modified libpcap format.
83 */
84 #define KUZNETZOV_TCPDUMP_MAGIC 0xa1b2cd34
85
86 /*
87 * Reserved for Francisco Mesquita <francisco.mesquita@radiomovel.pt>
88 * for another modified format.
89 */
90 #define FMESQUITA_TCPDUMP_MAGIC 0xa1b234cd
91
92 /*
93 * Navtel Communcations' format, with nanosecond timestamps,
94 * as per a request from Dumas Hwang <dumas.hwang@navtelcom.com>.
95 */
96 #define NAVTEL_TCPDUMP_MAGIC 0xa12b3c4d
97
98 /*
99 * Normal libpcap format, except for seconds/nanoseconds timestamps,
100 * as per a request by Ulf Lamping <ulf.lamping@web.de>
101 */
102 #define NSEC_TCPDUMP_MAGIC 0xa1b23c4d
103
104 /*
105 * Mechanism for storing information about a capture in the upper
106 * 6 bits of a linktype value in a capture file.
107 *
108 * LT_LINKTYPE_EXT(x) extracts the additional information.
109 *
110 * The rest of the bits are for a value describing the link-layer
111 * value. LT_LINKTYPE(x) extracts that value.
112 */
113 #define LT_LINKTYPE(x) ((x) & 0x03FFFFFF)
114 #define LT_LINKTYPE_EXT(x) ((x) & 0xFC000000)
115
116 static int pcap_next_packet(pcap_t *p, struct pcap_pkthdr *hdr, u_char **datap);
117
118 #ifdef _WIN32
119 /*
120 * This isn't exported on Windows, because it would only work if both
121 * libpcap and the code using it were using the same C runtime; otherwise they
122 * would be using different definitions of a FILE structure.
123 *
124 * Instead we define this as a macro in pcap/pcap.h that wraps the hopen
125 * version that we do export, passing it a raw OS HANDLE, as defined by the
126 * Win32 / Win64 ABI, obtained from the _fileno() and _get_osfhandle()
127 * functions of the appropriate CRT.
128 */
129 static pcap_dumper_t *pcap_dump_fopen(pcap_t *p, FILE *f);
130 #endif /* _WIN32 */
131
132 /*
133 * Private data for reading pcap savefiles.
134 */
135 typedef enum {
136 NOT_SWAPPED,
137 SWAPPED,
138 MAYBE_SWAPPED
139 } swapped_type_t;
140
141 typedef enum {
142 PASS_THROUGH,
143 SCALE_UP,
144 SCALE_DOWN
145 } tstamp_scale_type_t;
146
147 struct pcap_sf {
148 size_t hdrsize;
149 swapped_type_t lengths_swapped;
150 tstamp_scale_type_t scale_type;
151 };
152
153 /*
154 * Check whether this is a pcap savefile and, if it is, extract the
155 * relevant information from the header.
156 */
157 pcap_t *
pcap_check_header(const uint8_t * magic,FILE * fp,u_int precision,char * errbuf,int * err)158 pcap_check_header(const uint8_t *magic, FILE *fp, u_int precision, char *errbuf,
159 int *err)
160 {
161 bpf_u_int32 magic_int;
162 struct pcap_file_header hdr;
163 size_t amt_read;
164 pcap_t *p;
165 int swapped = 0;
166 struct pcap_sf *ps;
167
168 /*
169 * Assume no read errors.
170 */
171 *err = 0;
172
173 /*
174 * Check whether the first 4 bytes of the file are the magic
175 * number for a pcap savefile, or for a byte-swapped pcap
176 * savefile.
177 */
178 memcpy(&magic_int, magic, sizeof(magic_int));
179 if (magic_int != TCPDUMP_MAGIC &&
180 magic_int != KUZNETZOV_TCPDUMP_MAGIC &&
181 magic_int != NSEC_TCPDUMP_MAGIC) {
182 magic_int = SWAPLONG(magic_int);
183 if (magic_int != TCPDUMP_MAGIC &&
184 magic_int != KUZNETZOV_TCPDUMP_MAGIC &&
185 magic_int != NSEC_TCPDUMP_MAGIC)
186 return (NULL); /* nope */
187 swapped = 1;
188 }
189
190 /*
191 * They are. Put the magic number in the header, and read
192 * the rest of the header.
193 */
194 hdr.magic = magic_int;
195 amt_read = fread(((char *)&hdr) + sizeof hdr.magic, 1,
196 sizeof(hdr) - sizeof(hdr.magic), fp);
197 if (amt_read != sizeof(hdr) - sizeof(hdr.magic)) {
198 if (ferror(fp)) {
199 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
200 errno, "error reading dump file");
201 } else {
202 snprintf(errbuf, PCAP_ERRBUF_SIZE,
203 "truncated dump file; tried to read %zu file header bytes, only got %zu",
204 sizeof(hdr), amt_read);
205 }
206 *err = 1;
207 return (NULL);
208 }
209
210 /*
211 * If it's a byte-swapped capture file, byte-swap the header.
212 */
213 if (swapped) {
214 hdr.version_major = SWAPSHORT(hdr.version_major);
215 hdr.version_minor = SWAPSHORT(hdr.version_minor);
216 hdr.thiszone = SWAPLONG(hdr.thiszone);
217 hdr.sigfigs = SWAPLONG(hdr.sigfigs);
218 hdr.snaplen = SWAPLONG(hdr.snaplen);
219 hdr.linktype = SWAPLONG(hdr.linktype);
220 }
221
222 if (hdr.version_major < PCAP_VERSION_MAJOR) {
223 snprintf(errbuf, PCAP_ERRBUF_SIZE,
224 "archaic pcap savefile format");
225 *err = 1;
226 return (NULL);
227 }
228
229 /*
230 * currently only versions 2.[0-4] are supported with
231 * the exception of 543.0 for DG/UX tcpdump.
232 */
233 if (! ((hdr.version_major == PCAP_VERSION_MAJOR &&
234 hdr.version_minor <= PCAP_VERSION_MINOR) ||
235 (hdr.version_major == 543 &&
236 hdr.version_minor == 0))) {
237 snprintf(errbuf, PCAP_ERRBUF_SIZE,
238 "unsupported pcap savefile version %u.%u",
239 hdr.version_major, hdr.version_minor);
240 *err = 1;
241 return NULL;
242 }
243
244 /*
245 * OK, this is a good pcap file.
246 * Allocate a pcap_t for it.
247 */
248 p = PCAP_OPEN_OFFLINE_COMMON(errbuf, struct pcap_sf);
249 if (p == NULL) {
250 /* Allocation failed. */
251 *err = 1;
252 return (NULL);
253 }
254 p->swapped = swapped;
255 p->version_major = hdr.version_major;
256 p->version_minor = hdr.version_minor;
257 p->linktype = linktype_to_dlt(LT_LINKTYPE(hdr.linktype));
258 p->linktype_ext = LT_LINKTYPE_EXT(hdr.linktype);
259 p->snapshot = pcap_adjust_snapshot(p->linktype, hdr.snaplen);
260
261 p->next_packet_op = pcap_next_packet;
262
263 ps = p->priv;
264
265 p->opt.tstamp_precision = precision;
266
267 /*
268 * Will we need to scale the timestamps to match what the
269 * user wants?
270 */
271 switch (precision) {
272
273 case PCAP_TSTAMP_PRECISION_MICRO:
274 if (magic_int == NSEC_TCPDUMP_MAGIC) {
275 /*
276 * The file has nanoseconds, the user
277 * wants microseconds; scale the
278 * precision down.
279 */
280 ps->scale_type = SCALE_DOWN;
281 } else {
282 /*
283 * The file has microseconds, the
284 * user wants microseconds; nothing to do.
285 */
286 ps->scale_type = PASS_THROUGH;
287 }
288 break;
289
290 case PCAP_TSTAMP_PRECISION_NANO:
291 if (magic_int == NSEC_TCPDUMP_MAGIC) {
292 /*
293 * The file has nanoseconds, the
294 * user wants nanoseconds; nothing to do.
295 */
296 ps->scale_type = PASS_THROUGH;
297 } else {
298 /*
299 * The file has microseconds, the user
300 * wants nanoseconds; scale the
301 * precision up.
302 */
303 ps->scale_type = SCALE_UP;
304 }
305 break;
306
307 default:
308 snprintf(errbuf, PCAP_ERRBUF_SIZE,
309 "unknown time stamp resolution %u", precision);
310 free(p);
311 *err = 1;
312 return (NULL);
313 }
314
315 /*
316 * We interchanged the caplen and len fields at version 2.3,
317 * in order to match the bpf header layout. But unfortunately
318 * some files were written with version 2.3 in their headers
319 * but without the interchanged fields.
320 *
321 * In addition, DG/UX tcpdump writes out files with a version
322 * number of 543.0, and with the caplen and len fields in the
323 * pre-2.3 order.
324 */
325 switch (hdr.version_major) {
326
327 case 2:
328 if (hdr.version_minor < 3)
329 ps->lengths_swapped = SWAPPED;
330 else if (hdr.version_minor == 3)
331 ps->lengths_swapped = MAYBE_SWAPPED;
332 else
333 ps->lengths_swapped = NOT_SWAPPED;
334 break;
335
336 case 543:
337 ps->lengths_swapped = SWAPPED;
338 break;
339
340 default:
341 ps->lengths_swapped = NOT_SWAPPED;
342 break;
343 }
344
345 if (magic_int == KUZNETZOV_TCPDUMP_MAGIC) {
346 /*
347 * XXX - the patch that's in some versions of libpcap
348 * changes the packet header but not the magic number,
349 * and some other versions with this magic number have
350 * some extra debugging information in the packet header;
351 * we'd have to use some hacks^H^H^H^H^Hheuristics to
352 * detect those variants.
353 *
354 * Ethereal does that, but it does so by trying to read
355 * the first two packets of the file with each of the
356 * record header formats. That currently means it seeks
357 * backwards and retries the reads, which doesn't work
358 * on pipes. We want to be able to read from a pipe, so
359 * that strategy won't work; we'd have to buffer some
360 * data ourselves and read from that buffer in order to
361 * make that work.
362 */
363 ps->hdrsize = sizeof(struct pcap_sf_patched_pkthdr);
364
365 if (p->linktype == DLT_EN10MB) {
366 /*
367 * This capture might have been done in raw mode
368 * or cooked mode.
369 *
370 * If it was done in cooked mode, p->snapshot was
371 * passed to recvfrom() as the buffer size, meaning
372 * that the most packet data that would be copied
373 * would be p->snapshot. However, a faked Ethernet
374 * header would then have been added to it, so the
375 * most data that would be in a packet in the file
376 * would be p->snapshot + 14.
377 *
378 * We can't easily tell whether the capture was done
379 * in raw mode or cooked mode, so we'll assume it was
380 * cooked mode, and add 14 to the snapshot length.
381 * That means that, for a raw capture, the snapshot
382 * length will be misleading if you use it to figure
383 * out why a capture doesn't have all the packet data,
384 * but there's not much we can do to avoid that.
385 *
386 * But don't grow the snapshot length past the
387 * maximum value of an int.
388 */
389 if (p->snapshot <= INT_MAX - 14)
390 p->snapshot += 14;
391 else
392 p->snapshot = INT_MAX;
393 }
394 } else
395 ps->hdrsize = sizeof(struct pcap_sf_pkthdr);
396
397 /*
398 * Allocate a buffer for the packet data.
399 * Choose the minimum of the file's snapshot length and 2K bytes;
400 * that should be enough for most network packets - we'll grow it
401 * if necessary. That way, we don't allocate a huge chunk of
402 * memory just because there's a huge snapshot length, as the
403 * snapshot length might be larger than the size of the largest
404 * packet.
405 */
406 p->bufsize = p->snapshot;
407 if (p->bufsize > 2048)
408 p->bufsize = 2048;
409 p->buffer = malloc(p->bufsize);
410 if (p->buffer == NULL) {
411 snprintf(errbuf, PCAP_ERRBUF_SIZE, "out of memory");
412 free(p);
413 *err = 1;
414 return (NULL);
415 }
416
417 p->cleanup_op = sf_cleanup;
418
419 return (p);
420 }
421
422 /*
423 * Grow the packet buffer to the specified size.
424 */
425 static int
grow_buffer(pcap_t * p,u_int bufsize)426 grow_buffer(pcap_t *p, u_int bufsize)
427 {
428 void *bigger_buffer;
429
430 bigger_buffer = realloc(p->buffer, bufsize);
431 if (bigger_buffer == NULL) {
432 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "out of memory");
433 return (0);
434 }
435 p->buffer = bigger_buffer;
436 p->bufsize = bufsize;
437 return (1);
438 }
439
440 /*
441 * Read and return the next packet from the savefile. Return the header
442 * in hdr and a pointer to the contents in data. Return 1 on success, 0
443 * if there were no more packets, and -1 on an error.
444 */
445 static int
pcap_next_packet(pcap_t * p,struct pcap_pkthdr * hdr,u_char ** data)446 pcap_next_packet(pcap_t *p, struct pcap_pkthdr *hdr, u_char **data)
447 {
448 struct pcap_sf *ps = p->priv;
449 struct pcap_sf_patched_pkthdr sf_hdr;
450 FILE *fp = p->rfile;
451 size_t amt_read;
452 bpf_u_int32 t;
453
454 /*
455 * Read the packet header; the structure we use as a buffer
456 * is the longer structure for files generated by the patched
457 * libpcap, but if the file has the magic number for an
458 * unpatched libpcap we only read as many bytes as the regular
459 * header has.
460 */
461 amt_read = fread(&sf_hdr, 1, ps->hdrsize, fp);
462 if (amt_read != ps->hdrsize) {
463 if (ferror(fp)) {
464 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
465 errno, "error reading dump file");
466 return (-1);
467 } else {
468 if (amt_read != 0) {
469 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
470 "truncated dump file; tried to read %zu header bytes, only got %zu",
471 ps->hdrsize, amt_read);
472 return (-1);
473 }
474 /* EOF */
475 return (0);
476 }
477 }
478
479 if (p->swapped) {
480 /* these were written in opposite byte order */
481 hdr->caplen = SWAPLONG(sf_hdr.caplen);
482 hdr->len = SWAPLONG(sf_hdr.len);
483 hdr->ts.tv_sec = SWAPLONG(sf_hdr.ts.tv_sec);
484 hdr->ts.tv_usec = SWAPLONG(sf_hdr.ts.tv_usec);
485 } else {
486 hdr->caplen = sf_hdr.caplen;
487 hdr->len = sf_hdr.len;
488 hdr->ts.tv_sec = sf_hdr.ts.tv_sec;
489 hdr->ts.tv_usec = sf_hdr.ts.tv_usec;
490 }
491
492 switch (ps->scale_type) {
493
494 case PASS_THROUGH:
495 /*
496 * Just pass the time stamp through.
497 */
498 break;
499
500 case SCALE_UP:
501 /*
502 * File has microseconds, user wants nanoseconds; convert
503 * it.
504 */
505 hdr->ts.tv_usec = hdr->ts.tv_usec * 1000;
506 break;
507
508 case SCALE_DOWN:
509 /*
510 * File has nanoseconds, user wants microseconds; convert
511 * it.
512 */
513 hdr->ts.tv_usec = hdr->ts.tv_usec / 1000;
514 break;
515 }
516
517 /* Swap the caplen and len fields, if necessary. */
518 switch (ps->lengths_swapped) {
519
520 case NOT_SWAPPED:
521 break;
522
523 case MAYBE_SWAPPED:
524 if (hdr->caplen <= hdr->len) {
525 /*
526 * The captured length is <= the actual length,
527 * so presumably they weren't swapped.
528 */
529 break;
530 }
531 /* FALLTHROUGH */
532
533 case SWAPPED:
534 t = hdr->caplen;
535 hdr->caplen = hdr->len;
536 hdr->len = t;
537 break;
538 }
539
540 /*
541 * Is the packet bigger than we consider sane?
542 */
543 if (hdr->caplen > max_snaplen_for_dlt(p->linktype)) {
544 /*
545 * Yes. This may be a damaged or fuzzed file.
546 *
547 * Is it bigger than the snapshot length?
548 * (We don't treat that as an error if it's not
549 * bigger than the maximum we consider sane; see
550 * below.)
551 */
552 if (hdr->caplen > (bpf_u_int32)p->snapshot) {
553 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
554 "invalid packet capture length %u, bigger than "
555 "snaplen of %d", hdr->caplen, p->snapshot);
556 } else {
557 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
558 "invalid packet capture length %u, bigger than "
559 "maximum of %u", hdr->caplen,
560 max_snaplen_for_dlt(p->linktype));
561 }
562 return (-1);
563 }
564
565 if (hdr->caplen > (bpf_u_int32)p->snapshot) {
566 /*
567 * The packet is bigger than the snapshot length
568 * for this file.
569 *
570 * This can happen due to Solaris 2.3 systems tripping
571 * over the BUFMOD problem and not setting the snapshot
572 * length correctly in the savefile header.
573 *
574 * libpcap 0.4 and later on Solaris 2.3 should set the
575 * snapshot length correctly in the pcap file header,
576 * even though they don't set a snapshot length in bufmod
577 * (the buggy bufmod chops off the *beginning* of the
578 * packet if a snapshot length is specified); they should
579 * also reduce the captured length, as supplied to the
580 * per-packet callback, to the snapshot length if it's
581 * greater than the snapshot length, so the code using
582 * libpcap should see the packet cut off at the snapshot
583 * length, even though the full packet is copied up to
584 * userland.
585 *
586 * However, perhaps some versions of libpcap failed to
587 * set the snapshot length correctly in the file header
588 * or the per-packet header, or perhaps this is a
589 * corrupted safefile or a savefile built/modified by a
590 * fuzz tester, so we check anyway. We grow the buffer
591 * to be big enough for the snapshot length, read up
592 * to the snapshot length, discard the rest of the
593 * packet, and report the snapshot length as the captured
594 * length; we don't want to hand our caller a packet
595 * bigger than the snapshot length, because they might
596 * be assuming they'll never be handed such a packet,
597 * and might copy the packet into a snapshot-length-
598 * sized buffer, assuming it'll fit.
599 */
600 size_t bytes_to_discard;
601 size_t bytes_to_read, bytes_read;
602 char discard_buf[4096];
603
604 if (hdr->caplen > p->bufsize) {
605 /*
606 * Grow the buffer to the snapshot length.
607 */
608 if (!grow_buffer(p, p->snapshot))
609 return (-1);
610 }
611
612 /*
613 * Read the first p->snapshot bytes into the buffer.
614 */
615 amt_read = fread(p->buffer, 1, p->snapshot, fp);
616 if (amt_read != (bpf_u_int32)p->snapshot) {
617 if (ferror(fp)) {
618 pcap_fmt_errmsg_for_errno(p->errbuf,
619 PCAP_ERRBUF_SIZE, errno,
620 "error reading dump file");
621 } else {
622 /*
623 * Yes, this uses hdr->caplen; technically,
624 * it's true, because we would try to read
625 * and discard the rest of those bytes, and
626 * that would fail because we got EOF before
627 * the read finished.
628 */
629 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
630 "truncated dump file; tried to read %d captured bytes, only got %zu",
631 p->snapshot, amt_read);
632 }
633 return (-1);
634 }
635
636 /*
637 * Now read and discard what's left.
638 */
639 bytes_to_discard = hdr->caplen - p->snapshot;
640 bytes_read = amt_read;
641 while (bytes_to_discard != 0) {
642 bytes_to_read = bytes_to_discard;
643 if (bytes_to_read > sizeof (discard_buf))
644 bytes_to_read = sizeof (discard_buf);
645 amt_read = fread(discard_buf, 1, bytes_to_read, fp);
646 bytes_read += amt_read;
647 if (amt_read != bytes_to_read) {
648 if (ferror(fp)) {
649 pcap_fmt_errmsg_for_errno(p->errbuf,
650 PCAP_ERRBUF_SIZE, errno,
651 "error reading dump file");
652 } else {
653 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
654 "truncated dump file; tried to read %u captured bytes, only got %zu",
655 hdr->caplen, bytes_read);
656 }
657 return (-1);
658 }
659 bytes_to_discard -= amt_read;
660 }
661
662 /*
663 * Adjust caplen accordingly, so we don't get confused later
664 * as to how many bytes we have to play with.
665 */
666 hdr->caplen = p->snapshot;
667 } else {
668 /*
669 * The packet is within the snapshot length for this file.
670 */
671 if (hdr->caplen > p->bufsize) {
672 /*
673 * Grow the buffer to the next power of 2, or
674 * the snaplen, whichever is lower.
675 */
676 u_int new_bufsize;
677
678 new_bufsize = hdr->caplen;
679 /*
680 * https://graphics.stanford.edu/~seander/bithacks.html#RoundUpPowerOf2
681 */
682 new_bufsize--;
683 new_bufsize |= new_bufsize >> 1;
684 new_bufsize |= new_bufsize >> 2;
685 new_bufsize |= new_bufsize >> 4;
686 new_bufsize |= new_bufsize >> 8;
687 new_bufsize |= new_bufsize >> 16;
688 new_bufsize++;
689
690 if (new_bufsize > (u_int)p->snapshot)
691 new_bufsize = p->snapshot;
692
693 if (!grow_buffer(p, new_bufsize))
694 return (-1);
695 }
696
697 /* read the packet itself */
698 amt_read = fread(p->buffer, 1, hdr->caplen, fp);
699 if (amt_read != hdr->caplen) {
700 if (ferror(fp)) {
701 pcap_fmt_errmsg_for_errno(p->errbuf,
702 PCAP_ERRBUF_SIZE, errno,
703 "error reading dump file");
704 } else {
705 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
706 "truncated dump file; tried to read %u captured bytes, only got %zu",
707 hdr->caplen, amt_read);
708 }
709 return (-1);
710 }
711 }
712 *data = p->buffer;
713
714 pcap_post_process(p->linktype, p->swapped, hdr, *data);
715
716 return (1);
717 }
718
719 static int
sf_write_header(pcap_t * p,FILE * fp,int linktype,int snaplen)720 sf_write_header(pcap_t *p, FILE *fp, int linktype, int snaplen)
721 {
722 struct pcap_file_header hdr;
723
724 hdr.magic = p->opt.tstamp_precision == PCAP_TSTAMP_PRECISION_NANO ? NSEC_TCPDUMP_MAGIC : TCPDUMP_MAGIC;
725 hdr.version_major = PCAP_VERSION_MAJOR;
726 hdr.version_minor = PCAP_VERSION_MINOR;
727
728 /*
729 * https://www.tcpdump.org/manpages/pcap-savefile.5.txt states:
730 * thiszone: 4-byte time zone offset; this is always 0.
731 * sigfigs: 4-byte number giving the accuracy of time stamps
732 * in the file; this is always 0.
733 */
734 hdr.thiszone = 0;
735 hdr.sigfigs = 0;
736 hdr.snaplen = snaplen;
737 hdr.linktype = linktype;
738
739 if (fwrite((char *)&hdr, sizeof(hdr), 1, fp) != 1)
740 return (-1);
741
742 return (0);
743 }
744
745 /*
746 * Output a packet to the initialized dump file.
747 */
748 void
pcap_dump(u_char * user,const struct pcap_pkthdr * h,const u_char * sp)749 pcap_dump(u_char *user, const struct pcap_pkthdr *h, const u_char *sp)
750 {
751 register FILE *f;
752 struct pcap_sf_pkthdr sf_hdr;
753
754 f = (FILE *)user;
755 /*
756 * If the output file handle is in an error state, don't write
757 * anything.
758 *
759 * While in principle a file handle can return from an error state
760 * to a normal state (for example if a disk that is full has space
761 * freed), we have possibly left a broken file already, and won't
762 * be able to clean it up. The safest option is to do nothing.
763 *
764 * Note that if we could guarantee that fwrite() was atomic we
765 * might be able to insure that we don't produce a corrupted file,
766 * but the standard defines fwrite() as a series of fputc() calls,
767 * so we really have no insurance that things are not fubared.
768 *
769 * http://pubs.opengroup.org/onlinepubs/009695399/functions/fwrite.html
770 */
771 if (ferror(f))
772 return;
773 /*
774 * Better not try writing pcap files after
775 * 2038-01-19 03:14:07 UTC; switch to pcapng.
776 */
777 sf_hdr.ts.tv_sec = (bpf_int32)h->ts.tv_sec;
778 sf_hdr.ts.tv_usec = (bpf_int32)h->ts.tv_usec;
779 sf_hdr.caplen = h->caplen;
780 sf_hdr.len = h->len;
781 /*
782 * We only write the packet if we can write the header properly.
783 *
784 * This doesn't prevent us from having corrupted output, and if we
785 * for some reason don't get a complete write we don't have any
786 * way to set ferror() to prevent future writes from being
787 * attempted, but it is better than nothing.
788 */
789 if (fwrite(&sf_hdr, sizeof(sf_hdr), 1, f) == 1) {
790 (void)fwrite(sp, h->caplen, 1, f);
791 }
792 }
793
794 static pcap_dumper_t *
pcap_setup_dump(pcap_t * p,int linktype,FILE * f,const char * fname)795 pcap_setup_dump(pcap_t *p, int linktype, FILE *f, const char *fname)
796 {
797
798 #if defined(_WIN32) || defined(MSDOS)
799 /*
800 * If we're writing to the standard output, put it in binary
801 * mode, as savefiles are binary files.
802 *
803 * Otherwise, we turn off buffering.
804 * XXX - why? And why not on the standard output?
805 */
806 if (f == stdout)
807 SET_BINMODE(f);
808 else
809 setvbuf(f, NULL, _IONBF, 0);
810 #endif
811 if (sf_write_header(p, f, linktype, p->snapshot) == -1) {
812 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
813 errno, "Can't write to %s", fname);
814 if (f != stdout)
815 (void)fclose(f);
816 return (NULL);
817 }
818 return ((pcap_dumper_t *)f);
819 }
820
821 /*
822 * Initialize so that sf_write() will output to the file named 'fname'.
823 */
824 pcap_dumper_t *
pcap_dump_open(pcap_t * p,const char * fname)825 pcap_dump_open(pcap_t *p, const char *fname)
826 {
827 FILE *f;
828 int linktype;
829
830 /*
831 * If this pcap_t hasn't been activated, it doesn't have a
832 * link-layer type, so we can't use it.
833 */
834 if (!p->activated) {
835 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
836 "%s: not-yet-activated pcap_t passed to pcap_dump_open",
837 fname);
838 return (NULL);
839 }
840 linktype = dlt_to_linktype(p->linktype);
841 if (linktype == -1) {
842 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
843 "%s: link-layer type %d isn't supported in savefiles",
844 fname, p->linktype);
845 return (NULL);
846 }
847 linktype |= p->linktype_ext;
848
849 if (fname == NULL) {
850 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
851 "A null pointer was supplied as the file name");
852 return NULL;
853 }
854 if (fname[0] == '-' && fname[1] == '\0') {
855 f = stdout;
856 fname = "standard output";
857 } else {
858 /*
859 * "b" is supported as of C90, so *all* UN*Xes should
860 * support it, even though it does nothing. It's
861 * required on Windows, as the file is a binary file
862 * and must be written in binary mode.
863 */
864 f = charset_fopen(fname, "wb");
865 if (f == NULL) {
866 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
867 errno, "%s", fname);
868 return (NULL);
869 }
870 }
871 return (pcap_setup_dump(p, linktype, f, fname));
872 }
873
874 #ifdef _WIN32
875 /*
876 * Initialize so that sf_write() will output to a stream wrapping the given raw
877 * OS file HANDLE.
878 */
879 pcap_dumper_t *
pcap_dump_hopen(pcap_t * p,intptr_t osfd)880 pcap_dump_hopen(pcap_t *p, intptr_t osfd)
881 {
882 int fd;
883 FILE *file;
884
885 fd = _open_osfhandle(osfd, _O_APPEND);
886 if (fd < 0) {
887 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
888 errno, "_open_osfhandle");
889 return NULL;
890 }
891
892 file = _fdopen(fd, "wb");
893 if (file == NULL) {
894 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
895 errno, "_fdopen");
896 _close(fd);
897 return NULL;
898 }
899
900 return pcap_dump_fopen(p, file);
901 }
902 #endif /* _WIN32 */
903
904 /*
905 * Initialize so that sf_write() will output to the given stream.
906 */
907 #ifdef _WIN32
908 static
909 #endif /* _WIN32 */
910 pcap_dumper_t *
pcap_dump_fopen(pcap_t * p,FILE * f)911 pcap_dump_fopen(pcap_t *p, FILE *f)
912 {
913 int linktype;
914
915 linktype = dlt_to_linktype(p->linktype);
916 if (linktype == -1) {
917 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
918 "stream: link-layer type %d isn't supported in savefiles",
919 p->linktype);
920 return (NULL);
921 }
922 linktype |= p->linktype_ext;
923
924 return (pcap_setup_dump(p, linktype, f, "stream"));
925 }
926
927 pcap_dumper_t *
pcap_dump_open_append(pcap_t * p,const char * fname)928 pcap_dump_open_append(pcap_t *p, const char *fname)
929 {
930 FILE *f;
931 int linktype;
932 size_t amt_read;
933 struct pcap_file_header ph;
934
935 linktype = dlt_to_linktype(p->linktype);
936 if (linktype == -1) {
937 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
938 "%s: link-layer type %d isn't supported in savefiles",
939 fname, linktype);
940 return (NULL);
941 }
942
943 if (fname == NULL) {
944 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
945 "A null pointer was supplied as the file name");
946 return NULL;
947 }
948 if (fname[0] == '-' && fname[1] == '\0')
949 return (pcap_setup_dump(p, linktype, stdout, "standard output"));
950
951 /*
952 * "a" will cause the file *not* to be truncated if it exists
953 * but will cause it to be created if it doesn't. It will
954 * also cause all writes to be done at the end of the file,
955 * but will allow reads to be done anywhere in the file. This
956 * is what we need, because we need to read from the beginning
957 * of the file to see if it already has a header and packets
958 * or if it doesn't.
959 *
960 * "b" is supported as of C90, so *all* UN*Xes should support it,
961 * even though it does nothing. It's required on Windows, as the
962 * file is a binary file and must be read in binary mode.
963 */
964 f = charset_fopen(fname, "ab+");
965 if (f == NULL) {
966 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
967 errno, "%s", fname);
968 return (NULL);
969 }
970
971 /*
972 * Try to read a pcap header.
973 *
974 * We do not assume that the file will be positioned at the
975 * beginning immediately after we've opened it - we seek to
976 * the beginning. ISO C says it's implementation-defined
977 * whether the file position indicator is at the beginning
978 * or the end of the file after an append-mode open, and
979 * it wasn't obvious from the Single UNIX Specification
980 * or the Microsoft documentation how that works on SUS-
981 * compliant systems or on Windows.
982 */
983 if (fseek(f, 0, SEEK_SET) == -1) {
984 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
985 errno, "Can't seek to the beginning of %s", fname);
986 (void)fclose(f);
987 return (NULL);
988 }
989 amt_read = fread(&ph, 1, sizeof (ph), f);
990 if (amt_read != sizeof (ph)) {
991 if (ferror(f)) {
992 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
993 errno, "%s", fname);
994 (void)fclose(f);
995 return (NULL);
996 } else if (feof(f) && amt_read > 0) {
997 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
998 "%s: truncated pcap file header", fname);
999 (void)fclose(f);
1000 return (NULL);
1001 }
1002 }
1003
1004 #if defined(_WIN32) || defined(MSDOS)
1005 /*
1006 * We turn off buffering.
1007 * XXX - why? And why not on the standard output?
1008 */
1009 setvbuf(f, NULL, _IONBF, 0);
1010 #endif
1011
1012 /*
1013 * If a header is already present and:
1014 *
1015 * it's not for a pcap file of the appropriate resolution
1016 * and the right byte order for this machine;
1017 *
1018 * the link-layer header types don't match;
1019 *
1020 * the snapshot lengths don't match;
1021 *
1022 * return an error.
1023 */
1024 if (amt_read > 0) {
1025 /*
1026 * A header is already present.
1027 * Do the checks.
1028 */
1029 switch (ph.magic) {
1030
1031 case TCPDUMP_MAGIC:
1032 if (p->opt.tstamp_precision != PCAP_TSTAMP_PRECISION_MICRO) {
1033 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1034 "%s: different time stamp precision, cannot append to file", fname);
1035 (void)fclose(f);
1036 return (NULL);
1037 }
1038 break;
1039
1040 case NSEC_TCPDUMP_MAGIC:
1041 if (p->opt.tstamp_precision != PCAP_TSTAMP_PRECISION_NANO) {
1042 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1043 "%s: different time stamp precision, cannot append to file", fname);
1044 (void)fclose(f);
1045 return (NULL);
1046 }
1047 break;
1048
1049 case SWAPLONG(TCPDUMP_MAGIC):
1050 case SWAPLONG(NSEC_TCPDUMP_MAGIC):
1051 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1052 "%s: different byte order, cannot append to file", fname);
1053 (void)fclose(f);
1054 return (NULL);
1055
1056 case KUZNETZOV_TCPDUMP_MAGIC:
1057 case SWAPLONG(KUZNETZOV_TCPDUMP_MAGIC):
1058 case NAVTEL_TCPDUMP_MAGIC:
1059 case SWAPLONG(NAVTEL_TCPDUMP_MAGIC):
1060 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1061 "%s: not a pcap file to which we can append", fname);
1062 (void)fclose(f);
1063 return (NULL);
1064
1065 default:
1066 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1067 "%s: not a pcap file", fname);
1068 (void)fclose(f);
1069 return (NULL);
1070 }
1071
1072 /*
1073 * Good version?
1074 */
1075 if (ph.version_major != PCAP_VERSION_MAJOR ||
1076 ph.version_minor != PCAP_VERSION_MINOR) {
1077 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1078 "%s: version is %u.%u, cannot append to file", fname,
1079 ph.version_major, ph.version_minor);
1080 (void)fclose(f);
1081 return (NULL);
1082 }
1083 if ((bpf_u_int32)linktype != ph.linktype) {
1084 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1085 "%s: different linktype, cannot append to file", fname);
1086 (void)fclose(f);
1087 return (NULL);
1088 }
1089 if ((bpf_u_int32)p->snapshot != ph.snaplen) {
1090 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1091 "%s: different snaplen, cannot append to file", fname);
1092 (void)fclose(f);
1093 return (NULL);
1094 }
1095 } else {
1096 /*
1097 * A header isn't present; attempt to write it.
1098 */
1099 if (sf_write_header(p, f, linktype, p->snapshot) == -1) {
1100 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
1101 errno, "Can't write to %s", fname);
1102 (void)fclose(f);
1103 return (NULL);
1104 }
1105 }
1106
1107 /*
1108 * Start writing at the end of the file.
1109 *
1110 * XXX - this shouldn't be necessary, given that we're opening
1111 * the file in append mode, and ISO C specifies that all writes
1112 * are done at the end of the file in that mode.
1113 */
1114 if (fseek(f, 0, SEEK_END) == -1) {
1115 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
1116 errno, "Can't seek to the end of %s", fname);
1117 (void)fclose(f);
1118 return (NULL);
1119 }
1120 return ((pcap_dumper_t *)f);
1121 }
1122
1123 FILE *
pcap_dump_file(pcap_dumper_t * p)1124 pcap_dump_file(pcap_dumper_t *p)
1125 {
1126 return ((FILE *)p);
1127 }
1128
1129 long
pcap_dump_ftell(pcap_dumper_t * p)1130 pcap_dump_ftell(pcap_dumper_t *p)
1131 {
1132 return (ftell((FILE *)p));
1133 }
1134
1135 #if defined(HAVE_FSEEKO)
1136 /*
1137 * We have fseeko(), so we have ftello().
1138 * If we have large file support (files larger than 2^31-1 bytes),
1139 * ftello() will give us a current file position with more than 32
1140 * bits.
1141 */
1142 int64_t
pcap_dump_ftell64(pcap_dumper_t * p)1143 pcap_dump_ftell64(pcap_dumper_t *p)
1144 {
1145 return (ftello((FILE *)p));
1146 }
1147 #elif defined(_MSC_VER)
1148 /*
1149 * We have Visual Studio; we support only 2005 and later, so we have
1150 * _ftelli64().
1151 */
1152 int64_t
pcap_dump_ftell64(pcap_dumper_t * p)1153 pcap_dump_ftell64(pcap_dumper_t *p)
1154 {
1155 return (_ftelli64((FILE *)p));
1156 }
1157 #else
1158 /*
1159 * We don't have ftello() or _ftelli64(), so fall back on ftell().
1160 * Either long is 64 bits, in which case ftell() should suffice,
1161 * or this is probably an older 32-bit UN*X without large file
1162 * support, which means you'll probably get errors trying to
1163 * write files > 2^31-1, so it won't matter anyway.
1164 *
1165 * XXX - what about MinGW?
1166 */
1167 int64_t
pcap_dump_ftell64(pcap_dumper_t * p)1168 pcap_dump_ftell64(pcap_dumper_t *p)
1169 {
1170 return (ftell((FILE *)p));
1171 }
1172 #endif
1173
1174 int
pcap_dump_flush(pcap_dumper_t * p)1175 pcap_dump_flush(pcap_dumper_t *p)
1176 {
1177
1178 if (fflush((FILE *)p) == EOF)
1179 return (-1);
1180 else
1181 return (0);
1182 }
1183
1184 void
pcap_dump_close(pcap_dumper_t * p)1185 pcap_dump_close(pcap_dumper_t *p)
1186 {
1187
1188 #ifdef notyet
1189 if (ferror((FILE *)p))
1190 return-an-error;
1191 /* XXX should check return from fclose() too */
1192 #endif
1193 (void)fclose((FILE *)p);
1194 }
1195